1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
3 years ago
12

Xxxuuuuuuuuuujjnmnjjh

Computers and Technology
1 answer:
Leviafan [203]3 years ago
7 0
Answer: What’s this??
You might be interested in
Which type of financial institution typically has membership requirements?
Anon25 [30]
Credit Union typically has membership requirements
8 0
3 years ago
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
ICE Princess25 [194]

Answer:

copyright

Explanation:

3 0
4 years ago
Question # 6
ziro4ka [17]

Answer:

Scope.

Explanation:

In programming, the scope could be static, private or public and in those, defines the scope of a specific variable.

Ex.

public int x = 0; // Can be seen when called within a whole class and outside of a class/ function.

private int y = 0; // Can be seen only within the class its defined in.

static pub/priv int z = 0; // Uncangeable variable that can be defined in both class and external class, depending on the two prior scopes defined after.

int aa = 0; // Defaults to private.

5 0
3 years ago
Read 2 more answers
A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.
Jobisdone [24]

Answer:

Protocol

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols are the reason you can easily communicate with people all over the world, and thus play a critical role in modern digital communications.

3 0
3 years ago
Other questions:
  • In one to two sentences, describe how you would insert a row in a spreadsheet.
    5·2 answers
  • Write a simple hello world program in python 3
    8·2 answers
  • Which orientation style has more height than width?
    11·1 answer
  • T.L.E
    6·1 answer
  • Which of the following commands should be used if a user does NOT want the header which has been created to appear on the first
    13·1 answer
  • Anybody know #3 ? I need two ppl to answer this !! Free Brainliest!!
    14·2 answers
  • 36 points!!
    14·2 answers
  • Why is it important to enforce access controls and to keep logs regarding who has access to data closets
    14·2 answers
  • How do you create a turtle in python again-
    6·1 answer
  • The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!